June 22, 2011

The "journalist" Jesus Diaz writes about tornadoes in the Midwest: "It's hard to believe that this beauty (sic) can cause so much grief and damage, but from space even the deadliest of natural (sic) disasters always looks strangely soothing and mesmerizing. Those 'explosions' of clouds seem to come from Earth herself. The satellite images show five days of deadly Midwestern tornadoes, from May 20 to 25. They were taken by the G.O.E.S.-13 satellite and ithey show the storms that spawned the deadly Joplin, Missouri tornado on May 22 (around 5:30 p.m.) and the Oklahoma tornado event (Oklahoma City and Piedmont, Oklahoma) on May 24, 2011.

The G.O.E.S. (Geostationary Operational Environmental Satellite) network is operated by the National Oceanographic and Atmospheric Administration and N.A.S.A. You can actually watch them all updating here. [N.A.S.A. Goddard]"

The silly Diaz provides us with precious information, when he observes: "Those 'explosions' of clouds appear to come from the Earth itself." . It is just this way! In fact the huge cones of clouds, taken from the satellite, are generated by special machines built just by N.A.S.A., the military and "scientific" institution, which takes the vortices.

We have no doubt: the calamities in the United States (disastrous fires in the west, floods in the Midwest) are ALL of military origin. The secret government uses deadly weapons to destroy the nation. It is not a coincidence: N.A.S.A. recently sent letters to the staff, in which it recommends the employees and their families to prepare themselves for an emergency (earthquake, epidemic, flood, riot...), taking stock of supplies.

June 04, 2011

Most people use social media like Facebook and Twitter to share photos of friends and family, chat with friends and strangers about random and amusing diversions, or follow their favorite websites, bands and television shows.

But what does the US military use those same networks for? Well, we can't tell you: That's "classified," a CENTCOM spokesman recently informed Raw Story.

One use that's confirmed, however, is the manipulation of social media through the use of fake online "personas" managed by the military. Raw Story recently reported that the US Air Force had solicited private sector vendors for something called "persona management software." Such a technology would allow single individuals to command virtual armies of fake, digital "people" across numerous social media portals.

These "personas" were to have detailed, fictionalized backgrounds, to make them believable to outside observers, and a sophisticated identity protection service was to back them up, preventing suspicious readers from uncovering the real person behind the account. They even worked out ways to game geolocating services, so these "personas" could be virtually inserted anywhere in the world, providing ostensibly live commentary on real events, even while the operator was not really present.

When Raw Story first reported on the contract for this software, it was unclear what the Air Force wanted with it or even if it had been acquired. The potential for misuse, however, was abundantly clear.

A fake virtual army of people could be used to help create the impression of consensus opinion in online comment threads, or manipulate social media to the point where valuable stories are suppressed.

Ultimately, this can have the effect of causing a net change to the public's opinions and understanding of key world events.

'Classified social media activities'

According to Commander Bill Speaks, the chief media officer of CENTCOM's digital engagement team, the public cannot know what the military wants with such technology because its applications are secret.

"This contract," he wrote in reference to the Air Force's June 22, 2010 filing, "supports classified social media activities outside the U.S., intended to counter violent extremist ideology and enemy propaganda."

Speaks insisted that he was speaking only on behalf of CENTCOM, not the Air Force "or other branches of the military."

While he did reveal who was awarded the contract in question (PDF), he added that the Air Force, which helps CENTCOM's contracting process out of MacDill, has even other uses for social media that he could not address.

A series of targeted searches for other "persona management software" contracts yielded no results.

Mystery bidder

While data security firm HBGary Federal was among the contract's bidders listed on a government website, the job was ultimately awarded to a firm that did not appear on the FedBizOpps.gov page of interested vendors.

HBGary, which conspired with Bank of America and the Chamber of Commerce to attack WikiLeaks, spy on progressive writers and use malware against progressive organizations, was also revealed to have constructed software eerily similar to what the Air Force sought.

"This contract was awarded to a firm called Ntrepid," Speaks wrote to Raw Story. "In addition to the classified activities this software supports, USCENTCOM, like most military commands, does use social media to inform the public of our activities. I should emphasize that such uses do not employ the kind of technology that was the subject of this contract solicitation."

Ntrepid Corporation, registered out of Los Angeles, bills itself as a privacy and identity protection firm in some job postings, and a national security contractor in others, but its official website was amazingly just one page deep and free of even a single word of description.

In spite of their thin online presence, Speaks said the firm was awarded $2,760,000 to carry out the "persona management" contract.

He added that it was unclear why the contract went to an unlisted bidder, and that he would try to find out and report back.

Update: On Wednesday morning, Speaks issued the following statement: "Federal Business Opportunities is a tool used to advertise Government requirements. When a requirement is posted on the FedBizOpps.gov website, potential offerors can enter their information into the interested vendors section but, they are not required to in order to be eligible to compete. Additionally, an offeror need not have access to the FedBizOpps.gov website in order to compete for Government contracts."

Far from just being involved in privacy efforts, Ntrepid is a player in the national security realm and was invited to give a presentation for the US EUCOM i3T conference, which took place in Berlin last week.

Event organizers described the affair as a series of talks "on the challenges to developing technology, demonstrations of advanced technology pertinent to facilitating and/or enabling security and stability, ways and means of analyzing socio-cultural risks and opportunities, and the operationalization and execution of solutions to mitigate or avail issues with U.S. and multinational partners."

Featured speakers included the US EUCOM director of intelligence, the director of the Air Force Research Labratory and the chief information officer of the Defense Intelligence Agency, among other high-profile names.

While the company is remarkably scarce with information on their website, descriptions of the firm's goals seem to vary depending on their job openings.

But another help wanted ad, seeking an "intelligence analyst" on Appone.com, described Ntrepid as "a leading provider of technology and managed services to national security customers in the areas of cyber operations, analytics, language engineering, and TTL".

Its customers are both public and private sector, the ad said.

A Linked In profile of the company cited them as providers of "software, hardware, and managed services for cyber operations, analytics, linguistics, and surveillance." It had at least 30 employees, according to the business networking site, all located in either San Diego or Washington, DC.

Cottrell himself has advocated on behalf of civil liberties, claiming that widespread Internet surveillance tends to provide no real security benefits.

Efforts to contract both Ntrepid Corporation and Mr. Cottrell did not trigger a response by late Tuesday. A phone number could not be located.

Updated from a prior version after the contract disappeared from a government website.

Ratings by outbrain

Followers

Welcome to mirror blog of Tanker Enemy Italy

Chemtrails: the truth about criminal aerosol operations in the skies all over the world.************************Contrails only form at very high altitudes (usually ~26,000 to 30,000 feet) where the air is extremely cold (less than -42 degrees C) and the relative humidity is near to 72 percent.

Pay attention to non persistent and brief chemtrails that can appear as contrails. At low altitude we cannot see contrails, so, if you see a non persistent trail, this is a chemtrail like persistent chemtrails.